![cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103021/cybersecurity-400x200.jpg)
FIDO2: Authenticate easily with phishing-resistant security
The FIDO Alliance and the World Wide Web Consortium (W3C) have achieved a standards milestone in the global effort to bring simpler yet stronger web authentication to users …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102945/question-400x200.jpg)
How many can detect a major cybersecurity incident within an hour?
Less than half of all organizations were able to detect a major cybersecurity incident within one hour. Even more concerning, less than one-third said that even if they …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112041/cloud-400x200.jpg)
Organizations want to leverage the cloud but are held back by security misconceptions
iboss has published the findings of its 2018 Enterprise Cloud Trends report. The survey of IT decision makers and office workers in U.S. enterprises found that 64% of IT …
![siren](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101354/siren-400x200.jpg)
Emergency alert systems used across the US can be easily hijacked
A vulnerability affecting emergency alert systems supplied by ATI Systems, one of the leading suppliers of warning sirens in the USA, could be exploited remotely via radio …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105121/phishing-400x200.jpg)
Major uptick in mobile phishing URL click rate
In a study of Lookout users, more than half clicked mobile phishing URLs that bypassed existing security controls. Since 2011, Lookout has observed this mobile phishing URL …
![Cryptshare](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101357/cryptshare-400x200.jpg)
Cryptshare brings its secure communication and privacy solution to U.S. market
Cryptshare, a German-based maker of data security and privacy solutions for the exchange of business-critical information, today announced its expanded presence in the U.S. …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
How the human factor puts your company at risk
Positive Technologies has released a new report with statistics on the success rates of social engineering attacks, based on the 10 largest and most illustrative pentesting …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102608/healthcare-400x200.jpg)
How to minimize healthcare supply chain threats
There are many reasons why healthcare institutions have poor cybersecurity: most resources go towards providing patient care and not enough is left for cybersecurity; not all …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Steps executives are taking to increase security while launching new ways to pay
More than 80 percent of organizations that have been impacted by a data breach have introduced a new security framework and 79 percent have reduced employee access to customer …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101404/cisco-400x200.jpg)
Hackers leverage flaw in Cisco switches to hit Russian, Iranian networks
The proof-of-concept exploit code for a vulnerability affecting many Cisco switches has been leveraged by vigilante hackers to mess with networks and data-centers in Russia …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101402/money-clip-400x200.jpg)
Global IT spending to grow 6.2% in 2018
Worldwide IT spending is projected to total $3.7 trillion in 2018, an increase of 6.2 percent from 2017, according to the latest forecast by Gartner. “Although global IT …
![Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103838/telegram-400x200.jpg)
Russian government asks court to allow them to block Telegram
Russian communications regulator’s fight to block the Telegram encrypted messaging service continues. Telegram (the company) has been fighting the Roskomnadzor – …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)